Autonomic Mul,- Agents Security System for mul,- layered distributed architectures. Chris,an Contreras

Size: px
Start display at page:

Download "Autonomic Mul,- Agents Security System for mul,- layered distributed architectures. Chris,an Contreras"

Transcription

1 Autonomic Mul,- s Security System for mul,- layered distributed architectures Chris,an Contreras

2 Agenda Introduc,on Mul,- layered distributed architecture Autonomic compu,ng system Mul,- System (MAS) Autonomic Mul, Security System JADE Framework Proposed solu,on features Conclusions Comments and ques,ons

3 Introduc,on Mul,- layered and distributed system architecture Characteris,cs : heterogeneity and complexity. Increase Cyber threats. à Security concerns grows. Maintain the SLO or SLA. We need security systems with a new approach. System that can response to current threats and future threats in a quicker and efficient way. Autonomic Compu,ng System (ACS) + Mul,- agent System(MAS) Autonomous system Self adap,ve Self protec,ng Knowledge Base à learning process

4 Mul,- layered distributed architecture

5 Architecture comparison Autonomic Compu,ng Proper,es Self- Configuring Self- Op,mizing Self- Healing Self- protec,ng MAPE- K Framework Define behavior Mul,- System Proper,es Autonomy Reac,vity Pro- ac,veness Social ability Desire Belief Inten,on (BDI) Model Define agent behavior

6 Autonomic Compu,ng Systems : MAPE- K framework Sensor Effector

7 Autonomic Compu,ng Systems : MAPE- K framework Monitor and collects the details from the managed resources using sensors. Analysis perform complex data analysis. It uses the stored knowledge data. Plan structures the ac,ons needed to achieve goals and objec,ves. Execute changes the behavior of the managed resource using effectors. Knowledge standard data shared that includes data such as topology informa,on, historical logs, metrics, symptoms and policies.

8 Autonomic Compu,ng System : Basic Proper,es

9 Mul, System proper,es Autonomy is the freedom that an agent has to make decisions. Reac;vity is the response to changes in the environment. Pro- ac;veness is the exhibi,ons of a goal- directed behavior. Social ability is the ability to successfully interact and cooperate with others agents.

10 BDI behavior model agents Desires (Goals) Beliefs (Knowledge Base) Sensor Input Interpreter (Reasoner) Event Queue Environment Plan Library (Procedural Knowledge) Inten,ons (Plan Instance) Inten,on Queue Ac;on Output

11 Mul, System Architecture Analysis Analysis Analysis Analysis Security Monitor Monitor 1 Monitor 1 1 Sensor Input Planning Planning Planning Manager Monitor Monitor 2 2 Environment Learning Learning Execu,oner Execu,oner Execu,oner Ac;on Output

12 Mul, System Architecture: Type of agents Reac,ve agent It reacts to an event and does not perform any kind of deduc,on. It always behaves in the same way. (pre- defined) Prac,cal reasoning agent It has a proac,ve behavior and make decisions on its own. First it deliberates what state of affairs to achieve Second it decides how to achieve the desired state of affairs. Predefined sets of ac,ons. (Plans) Deduc,ve reasoning agent There is a descrip,on of the environment. There are a set of rules. The agent deduces the appropriate set of ac,ons

13 Autonomic Mul,- Security System Desires (Goals) Plan Library (Procedural Knowledge) AMS DF Security Inten,ons (Plan Instance) Beliefs (Knowledge Base) Event Queue Sensor Effector Inten,on Queue

14 Autonomic Mul,- Security System JAVA DEvelopment (JADE) Framework

15 Autonomic Mul,- Security System JAVA DEvelopment (JADE) Framework

16 JADE Architecture Container: a running instance of the JADE run,me and may contain several agents (zero or more agents). PlaJorm: the set of all ac,ve containers Main container: First container to start in a pla]orm Must always be ac,ve All other containers (normal, non- main) must register with host and port of the main container. Special agents Management System (AMS). Provides the naming service Represents the authority Directory Facilitator (DF). Provides a Yellow Pages service Communica,on is based on an asynchronous message passing paradigm (ACL language).

17 Autonomic Mul,- Security System Containers External Knowledge Base Knowledge Base AMS Knowledge Base DF Main Container

18 Autonomic Mul,- Security System Cloud Mul,- layer Middleware Cross layer security Resources

19 Autonomic Mul,- Security System Mul,- layered distributed system. Cross Layer security. Mul, agents behave emula,ng the MAPE- K framework. Modeling the Security Knowledge Base with ontologies. Security policies, rules, threat signatures, etc. Supervised and unsupervised learning techniques to acquire new knowledge. s are light- weight process. Detect and react faster.

20 Autonomic Mul,- Security System JAVA DEvelopment (JADE) Framework. A fully distributed system inhabited by agents, each running as a separate thread, poten,ally on different remote machines, and capable of transparently communica,ng with one another. Full compliance with the FIPA specifica,ons. (Founda,on for Intelligent Physical s) Uses FIPA Communica,on Language (ACL). Efficient transport of asynchronous messages via a loca,on- transparent API. Support agent mobility. Support ontologies and content languages

21 Autonomic Mul,- Security System Self- Protec,ng à Secure Informa,on and Resources Predic,on Supervised and unsupervised techniques. Detec,on and Inform Monitor performance system metric, request analysis, log analysis, system corrup,on, data corrup,on, IDS. Build security traps. Iden,fy Aaack signatures, system vulnerabili,es, boalenecks, conges,on. Protec,on Change cryptographic system, communica,on protocols, ACM, flow control, etc., filter requests, drop requests, limit resource usage, limit resource access, block resources, etc.

22 Autonomic Mul,- Security System Agency trust model Security policies. Registra,on service Supervise behavior Upgrade process s autonomic security schema Self- protec,ng Self- healing Self- configuring Self- op,miza,on

23 Conclusion Autonomic Mul,- Security System for mul,- layered distributed architectures is a defense in depth approach. Autonomic Security System that can self- protec,ng, self- healing, self- configuring, self- op,miza,on itself. Knowledge base using ontologies can provide Adaptability for future threats. Reach and share knowledge across the web. JADE framework provides a solid pla]orm with poten,al grow. à Jena Apache Ontology API. s are light- weight processes that can accomplish scalability and portability. Provide support to maintain the SLA or SLO.

24 Comments and Ques,ons

Jade: Java Agent DEvelopment Framework Overview

Jade: Java Agent DEvelopment Framework Overview Jade: Java Agent DEvelopment Framework Overview Stefano Mariani s.mariani@unibo.it Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università di Bologna a Cesena Academic Year

More information

Jade: Java Agent DEvelopment Framework Overview

Jade: Java Agent DEvelopment Framework Overview Jade: Java Agent DEvelopment Framework Overview Multiagent Systems LM Sistemi Multiagente LM Stefano Mariani revised by Andrea Omicini s.mariani@unibo.it, andrea.omicini@unibo.it Dipartimento di Informatica:

More information

Infrastructure Analy=cs: Driving Outcomes through Prac=cal Uses and Applied Data Science at Cisco

Infrastructure Analy=cs: Driving Outcomes through Prac=cal Uses and Applied Data Science at Cisco Copyright 2016 Splunk Inc. Infrastructure Analy=cs: Driving Outcomes through Prac=cal Uses and Applied Data Science at Cisco MaM Birkner Ian Hasund Robert Novak Dis=nguished Engineer, Cisco Chief Architect,

More information

Secure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek

Secure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek Secure Server Project Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek 1 Outline I. Mo9va9on, Objec9ves II. Threat Landscape III. Design IV. Status V. Roadmap 2 Mo9va9on In a nutshell: Secure

More information

ProAc&ve Rou&ng In Scalable Data Centers with PARIS

ProAc&ve Rou&ng In Scalable Data Centers with PARIS ProAc&ve Rou&ng In Scalable Data Centers with PARIS Theophilus Benson Duke University Joint work with Dushyant Arora + and Jennifer Rexford* + Arista Networks *Princeton University Data Center Networks

More information

CHAPTER 7 JAVA AGENT DEVELOPMENT ENVIRONMENT

CHAPTER 7 JAVA AGENT DEVELOPMENT ENVIRONMENT CHAPTER 7 JAVA AGENT DEVELOPMENT ENVIRONMENT 159 Chapter 7 Java Agent Development Environment For more enhanced information resources it requires that the information system is distributed in a network

More information

Information Collection and Survey Infrastructure, APIs, and Software Tools for Agent-based Systems (An Overview of JADE)

Information Collection and Survey Infrastructure, APIs, and Software Tools for Agent-based Systems (An Overview of JADE) Course Number: SENG 609.22 Session: Fall, 2003 Document Name: Infrastructure, APIs, and Software tools for agent-based system (An Overview of JADE) Course Name: Agent-based Software Engineering Department:

More information

Op#mizing MapReduce for Highly- Distributed Environments

Op#mizing MapReduce for Highly- Distributed Environments Op#mizing MapReduce for Highly- Distributed Environments Abhishek Chandra Associate Professor Department of Computer Science and Engineering University of Minnesota hep://www.cs.umn.edu/~chandra 1 Big

More information

1.1 Jadex - Engineering Goal-Oriented Agents

1.1 Jadex - Engineering Goal-Oriented Agents 1.1 Jadex - Engineering Goal-Oriented Agents In previous sections of the book agents have been considered as software artifacts that differ from objects mainly in their capability to autonomously execute

More information

Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey

Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey Applica@ons, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey N. Kayastha,D. Niyato, P. Wang and E. Hossain, Proceedings of the IEEEVol. 99, No. 12, Dec. 2011. Sabita Maharjan

More information

FIPA specification and JADE. Tomáš Poch

FIPA specification and JADE. Tomáš Poch FIPA specification and JADE Tomáš Poch Agents System that is situated in some environment, and that is capable of autonomous action in this environment in order to meet its design objectives [Wooldridge

More information

Towards developing multi-agent systems in Ada G. Aranda, J. Palanca, A. Espinosa, A. Terrasa, and A. García-Fornes {garanda,jpalanca,aespinos,aterrasa,agarcia}@dsic.upv.es Information Systems and Computation

More information

Securing Open- Source Databases in the Cloud Mike Frank, Director of Products

Securing Open- Source Databases in the Cloud Mike Frank, Director of Products Securing Open- Source Databases in the Cloud Mike Frank, Director of Products Session Agenda Cyber- security fears and the risks to your data in the cloud Overview of cloud and virtualized infrastructures,

More information

Con$nuous Audi$ng and Risk Management in Cloud Compu$ng

Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Marcus Spies Chair of Knowledge Management LMU University of Munich Scien$fic / Technical Director of EU Integrated Research Project MUSING Cloud

More information

Evaluating and Improving Software Usability

Evaluating and Improving Software Usability Evaluating and Improving Software Usability 902 : Thursday, 9:30am - 10:45am Philip Lew www.xbosoft.com Understand, Evaluate and Improve 2 Agenda Introduc7on Importance of usability What is usability?

More information

CCW Workshop Technical Session on Mobile Cloud Compu<ng

CCW Workshop Technical Session on Mobile Cloud Compu<ng CCW Workshop Technical Session on Mobile Cloud Compu

More information

Applying Data Visualiza0on to Analyze Ebola Call Center Trends

Applying Data Visualiza0on to Analyze Ebola Call Center Trends eh ea lth A F R I C A Applying Data Visualiza0on to Analyze Ebola Call Center Trends Sara Brown, MPH, CBIP Associate Crow Insight www.crowinsight.com Overview ehealth Africa & its role in figh=ng the Ebola

More information

Preliminary ACTL-SLOW Design in the ACS and OPC-UA context. G. Tos? (19/04/2016)

Preliminary ACTL-SLOW Design in the ACS and OPC-UA context. G. Tos? (19/04/2016) Preliminary ACTL-SLOW Design in the ACS and OPC-UA context G. Tos? (19/04/2016) Summary General Introduc?on to ACS Preliminary ACTL-SLOW proposed design Hardware device integra?on in ACS and ACTL- SLOW

More information

Scalable Middleware Environment for Agent-Based Internet Applications]

Scalable Middleware Environment for Agent-Based Internet Applications] Scalable Middleware Environment for Agent-Based Internet Applications] Benno J. Overeinder and Frances M.T. Brazier Department of Computer Science, Vrije Universiteit Amsterdam De Boelelaan 1081a, 1081

More information

Decision making for autonomous naviga2on. Anoop Aroor Advisor: Susan Epstein CUNY Graduate Center, Computer science

Decision making for autonomous naviga2on. Anoop Aroor Advisor: Susan Epstein CUNY Graduate Center, Computer science Decision making for autonomous naviga2on Anoop Aroor Advisor: Susan Epstein CUNY Graduate Center, Computer science Overview Naviga2on and Mobile robots Decision- making techniques for naviga2on Building

More information

Today s Objec4ves. Data Center. Virtualiza4on Cloud Compu4ng Amazon Web Services. What did you think? 10/23/17. Oct 23, 2017 Sprenkle - CSCI325

Today s Objec4ves. Data Center. Virtualiza4on Cloud Compu4ng Amazon Web Services. What did you think? 10/23/17. Oct 23, 2017 Sprenkle - CSCI325 Today s Objec4ves Virtualiza4on Cloud Compu4ng Amazon Web Services Oct 23, 2017 Sprenkle - CSCI325 1 Data Center What did you think? Oct 23, 2017 Sprenkle - CSCI325 2 1 10/23/17 Oct 23, 2017 Sprenkle -

More information

Western Michigan University

Western Michigan University CS-6030 Cloud compu;ng Google App engine Sepideh Mohammadi Summer II 2017 Western Michigan University content Categories of cloud compu;ng Google cloud plaborm Google App Engine Storage technologies Datastore

More information

Chapter 5 INTRODUCTION TO MOBILE AGENT

Chapter 5 INTRODUCTION TO MOBILE AGENT Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action

More information

Cyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure. Talal El Awar

Cyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure. Talal El Awar Cyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure Author: Goran N. Ericsson, Senior Member, IEEE Talal El Awar Submi.ed in Par3al Fulfillment of the Course Requirements

More information

Op#mizing PGAS overhead in a mul#-locale Chapel implementa#on of CoMD

Op#mizing PGAS overhead in a mul#-locale Chapel implementa#on of CoMD Op#mizing PGAS overhead in a mul#-locale Chapel implementa#on of CoMD Riyaz Haque and David F. Richards This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore

More information

Getting DCIM Right the First or Second Time Around. PRESENTED BY Chris James CEO, DCIMPro

Getting DCIM Right the First or Second Time Around. PRESENTED BY Chris James CEO, DCIMPro Getting DCIM Right the First or Second Time Around. PRESENTED BY Chris James CEO, DCIMPro Agenda: What are the Core Elements of DCIM? What is DCIM and why? The DCIM Maturation Model What is a Successful

More information

Op#mizing Websites for Results

Op#mizing Websites for Results MARKETING EDUCATION SERIES Op#mizing Websites for Results 10:00 AM 1:00 PM 3:00 PM David Warren VP Digital Media PennWell Objec5ve and Scope Of this Talk Objec5ve: To help you (marketers) make the most

More information

Prof. Jacques Pasquier

Prof. Jacques Pasquier Enhancing Communication within Complex Information Systems: An Agent Approach Prof. Jacques Pasquier 7/11/2008 Workshop: Reasoning, Inference, Decision and Other Things Department of Informatics, University

More information

Crea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed

Crea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed Crea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed April 29 th 2015 Leon Gommans: leon.gommans@klm.com Content - Introduc@on - Security Autonomous

More information

DEGAS: Dynamic Exascale Global Address Space

DEGAS: Dynamic Exascale Global Address Space DEGAS: Dynamic Exascale Global Address Space Katherine Yelick, LBNL PI Vivek Sarkar & John Mellor-Crummey, Rice James Demmel, Krste Asanoviç & Armando Fox, UC Berkeley Mattan Erez, UT Austin Dan Quinlan,

More information

IG-JADE-PKSlib. An Agent Based Framework for Advanced Web Service Composition and Provisioning. Erick Martínez & Yves Lespérance

IG-JADE-PKSlib. An Agent Based Framework for Advanced Web Service Composition and Provisioning. Erick Martínez & Yves Lespérance IG-JADE-PKSlib An Agent Based Framework for Advanced Web Service Composition and Provisioning Erick Martínez & Yves Lespérance Department of Computer Science York University Toronto, Canada 1 Motivation

More information

MPI Performance Analysis Trace Analyzer and Collector

MPI Performance Analysis Trace Analyzer and Collector MPI Performance Analysis Trace Analyzer and Collector Berk ONAT İTÜ Bilişim Enstitüsü 19 Haziran 2012 Outline MPI Performance Analyzing Defini6ons: Profiling Defini6ons: Tracing Intel Trace Analyzer Lab:

More information

Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012

Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 1. Opening Remarks 2. The State Identity Credential and Access Management Guidance and Roadmap (SICAM) (Chad Grant, NASCIO) 3. PIV

More information

Two Experiments with Service Composi4on: Trust/Privacy Management and Ac4on Planning for Mobile Robots. Mihhail Matskin KTH

Two Experiments with Service Composi4on: Trust/Privacy Management and Ac4on Planning for Mobile Robots. Mihhail Matskin KTH Two Experiments with Service Composi4on: Trust/Privacy Management and Ac4on Planning for Mobile Robots Mihhail Matskin KTH 2 cases Exploi4ng Dynamic privacy in socially regularized recommenders Trust and

More information

Design and Implementation of Multimedia Service Management Agent on Home Networks Environment

Design and Implementation of Multimedia Service Management Agent on Home Networks Environment IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 2006 91 Design and Implementation of Multimedia Service Management Agent on Home Networks Environment Won-Joo Hwang,

More information

ML4Bio Lecture #1: Introduc3on. February 24 th, 2016 Quaid Morris

ML4Bio Lecture #1: Introduc3on. February 24 th, 2016 Quaid Morris ML4Bio Lecture #1: Introduc3on February 24 th, 216 Quaid Morris Course goals Prac3cal introduc3on to ML Having a basic grounding in the terminology and important concepts in ML; to permit self- study,

More information

Introduction - GAMA. Gis & Agent-based Modeling Architecture. Agent-based, spatially explicit, modeling and simulation platform.

Introduction - GAMA. Gis & Agent-based Modeling Architecture. Agent-based, spatially explicit, modeling and simulation platform. Econofisica / Econophysics, Prof. Terna Anno accademico 2016/2017 GAMA Gis & Agent-based Modeling Architecture JADE JAVA Agent DEvelopment Framework Dr. Jacopo Pellegrino - http://personalpages.to.infn.it/~japelleg/

More information

FIPA-OS Feature Overview. Agent Technology Group Nortel Networks February 2000

FIPA-OS Feature Overview. Agent Technology Group Nortel Networks February 2000 FIPA-OS Feature Overview Agent Technology Group Nortel Networks February 2000 FIPA-OS - Aims FIPA-OS is a Open Source implementation of FIPA and is available for free. http://www.nort elnetworks.com/ fipa-os

More information

Software Integration Using a Dynamic Wrapper Agent

Software Integration Using a Dynamic Wrapper Agent Software Integration Using a Dynamic Wrapper Agent MIRIAM A. M. CAPRETZ & MARY C. HRYB Department of Electrical and Computer Engineering University of Western Ontario London, Ontario, CANADA N6A 5B9 Abstract:

More information

MapReduce, Apache Hadoop

MapReduce, Apache Hadoop Czech Technical University in Prague, Faculty of Informaon Technology MIE-PDB: Advanced Database Systems hp://www.ksi.mff.cuni.cz/~svoboda/courses/2016-2-mie-pdb/ Lecture 12 MapReduce, Apache Hadoop Marn

More information

MapReduce, Apache Hadoop

MapReduce, Apache Hadoop NDBI040: Big Data Management and NoSQL Databases hp://www.ksi.mff.cuni.cz/ svoboda/courses/2016-1-ndbi040/ Lecture 2 MapReduce, Apache Hadoop Marn Svoboda svoboda@ksi.mff.cuni.cz 11. 10. 2016 Charles University

More information

CORPORATE PRESENTATION

CORPORATE PRESENTATION CORPORATE PRESENTATION Background on device detec/on (1/2) Identifying the capabilities of a device accessing web contents has been an extensively explored issue in the past years, in particular in the

More information

Scaling the Wholesale Interconnect Market. Gastón Cu0gnola Senior Sales Engineer Telco Systems

Scaling the Wholesale Interconnect Market. Gastón Cu0gnola Senior Sales Engineer Telco Systems Host Sponsor Co- Sponsor Scaling the Wholesale Interconnect Market Gastón Cu0gnola Senior Sales Engineer Telco Systems 1 Presenta0on Agenda Status of Wholesale/Interconnect Environments Moving up the curve

More information

Yellow pages and Interaction Protocols

Yellow pages and Interaction Protocols Yellow pages and Interaction Protocols Fabiano Dalpiaz Agent-Oriented Software Engineering (AOSE) 2009-10 Yellow pages How do you look for someone providing a service? Either you know a service provider......or

More information

Health Monitoring Service for Multi-Agent Systems

Health Monitoring Service for Multi-Agent Systems Health Monitoring Service for Multi-Agent Systems MSc Thesis Final Report A thesis submitted in part fulfilment of the degree of MSc in Advanced Software Engineering with the supervision of Dr. Rem Collier

More information

Wireless Mul*hop Ad Hoc Networks

Wireless Mul*hop Ad Hoc Networks Wireless Mul*hop Guevara Noubir noubir@ccs.neu.edu Some slides are from Nitin Vaidya s tutorial. Infrastructure vs. Ad Hoc Wireless Networks Infrastructure networks: One or several Access- Points (AP)

More information

A Distributed Data- Parallel Execu3on Framework in the Kepler Scien3fic Workflow System

A Distributed Data- Parallel Execu3on Framework in the Kepler Scien3fic Workflow System A Distributed Data- Parallel Execu3on Framework in the Kepler Scien3fic Workflow System Ilkay Al(ntas and Daniel Crawl San Diego Supercomputer Center UC San Diego Jianwu Wang UMBC WorDS.sdsc.edu Computa3onal

More information

Use and Reuse of Multi-Agent Models and Techniques in a Distributed Systems Development Framework

Use and Reuse of Multi-Agent Models and Techniques in a Distributed Systems Development Framework Use and Reuse of Multi-Agent Models and Techniques in a Distributed Systems Development Framework Agostino Poggi, Michele Tomaiuolo Dipartimento di Ingegneria dell Informazione Università degli Studi di

More information

The American University at Cairo. The Computer Science Department. Csci485-Intelligent Agents. Spring 2006 Dr Rafea. JADE Tutorial

The American University at Cairo. The Computer Science Department. Csci485-Intelligent Agents. Spring 2006 Dr Rafea. JADE Tutorial The American University at Cairo The Computer Science Department Csci485-Intelligent Agents Spring 2006 Dr Rafea JADE Tutorial 1. Introduction Intelligent Agents have been extensively used in different

More information

Scheduling with Energy & Network Constraints

Scheduling with Energy & Network Constraints Scheduling with Energy & Network Constraints Barna Saha College of Informa

More information

Amol Deshpande, University of Maryland Lisa Hellerstein, Polytechnic University, Brooklyn

Amol Deshpande, University of Maryland Lisa Hellerstein, Polytechnic University, Brooklyn Amol Deshpande, University of Maryland Lisa Hellerstein, Polytechnic University, Brooklyn Mo>va>on: Parallel Query Processing Increasing parallelism in compu>ng Shared nothing clusters, mul> core technology,

More information

Fifty Years of Operating Systems. SIGOPS SOSP History Day October 4, 2015

Fifty Years of Operating Systems. SIGOPS SOSP History Day October 4, 2015 Fifty Years of Operating Systems SIGOPS SOSP History Day October 4, 2015 1 The Story Opera)ng systems are a major enterprise within compu)ng. They are hosted on over a billion devices connected to the

More information

PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014

PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014 PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014 Goal of the Panel Engage the workshop par/cipants in an interac/ve discussion of the experimenta/on capabili/es and

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Intelligent Content- Aware Data Priori2za2on and Synchroniza2on across Disconnected, Intermi<ent, Limited (DIL) Networks

Intelligent Content- Aware Data Priori2za2on and Synchroniza2on across Disconnected, Intermi<ent, Limited (DIL) Networks Intelligent Content- Aware Data Priori2za2on and Synchroniza2on across Disconnected, Intermi

More information

Distributed Systems INF Michael Welzl

Distributed Systems INF Michael Welzl Distributed Systems INF 3190 Michael Welzl What is a distributed system (DS)? Many defini8ons [Coulouris & Emmerich] A distributed system consists of hardware and sodware components located in a network

More information

GeIng Deeper Insights into your and Storage with Splunk

GeIng Deeper Insights into your and Storage with Splunk Copyright 2014 Splunk Inc. GeIng Deeper Insights into your Virtualiza@on and Storage with Splunk Stela Udovicic Sr. Product Marke@ng Manager, Splunk Michael Donnelly Senior SE, Virtualiza@on Technologies

More information

Autonomous Threat Hun?ng With Niddel And Splunk Enterprise Security: Mars Inc. Customer Case Study

Autonomous Threat Hun?ng With Niddel And Splunk Enterprise Security: Mars Inc. Customer Case Study Copyright 2016 Splunk Inc. Autonomous Threat Hun?ng With Niddel And Splunk Enterprise Security: Mars Inc. Customer Case Study Alex Pinto Chief Data Scien?st, Niddel Greg Poniatowski Security Service Area

More information

Today s Objec2ves. AWS/MR Review Final Projects Distributed File Systems. Nov 3, 2017 Sprenkle - CSCI325

Today s Objec2ves. AWS/MR Review Final Projects Distributed File Systems. Nov 3, 2017 Sprenkle - CSCI325 Today s Objec2ves AWS/MR Review Final Projects Distributed File Systems Nov 3, 2017 Sprenkle - CSCI325 1 Inverted Index final input files have been posted Another email out to AWS Google cloud Nov 3, 2017

More information

Personal Travel Assistant A Multi-Agent Approach

Personal Travel Assistant A Multi-Agent Approach BABEŞ-BOLYAI UNIVERSITY CLUJ-NAPOCA FACULTY OF MATHEMATICS AND COMPUTER SCIENCE SPECIALIZATION COMPUTER SCIENCE DIPLOMA THESIS Personal Travel Assistant A Multi-Agent Approach Supervisor Prof. univ. dr.

More information

Smart Buildings as Cyber- Physical Systems (CPS) In Smart Cities: Living Building

Smart Buildings as Cyber- Physical Systems (CPS) In Smart Cities: Living Building Smart Buildings as Cyber- Physical Systems (CPS) In Smart Cities: Living Building Dr. Driss Benhaddou Associate Professor and Fulbright Scholar University of Houston, TX dbenhaddou@uh.edu Tuesday, 01/05/2016

More information

geoff.thorpe@nxp.com:/microcontrollers/r&d/security Software Involvement in open source around security and networking (OpenSSL member) Interests in security scalability Member of Zephyr governance board

More information

Clinical Metadata A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang

Clinical Metadata A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang 1 Agenda How is metadata currently managed within the industry? Five key problems with current approaches.

More information

Project Title: IoT Open Innova:on

Project Title: IoT Open Innova:on ASEAN IVO 2016 The widespread usage of smart phones and smart devices in the network today has transformed the network into a connected web of smart devices. These devices are made smart by the applica:ons

More information

10 Things to Consider When Using Apache Ka7a: U"liza"on Points of Apache Ka4a Obtained From IoT Use Case

10 Things to Consider When Using Apache Ka7a: Ulizaon Points of Apache Ka4a Obtained From IoT Use Case 10 Things to Consider When Using Apache Ka7a: U"liza"on Points of Apache Ka4a Obtained From IoT Use Case May 16, 2017 NTT DATA CorporaAon Naoto Umemori, Yuji Hagiwara 2017 NTT DATA Corporation Contents

More information

Clocker. Deploying Complex Applica3ons on Docker using Apache Brooklyn

Clocker. Deploying Complex Applica3ons on Docker using Apache Brooklyn Clocker Deploying Complex Applica3ons on Docker using Apache Brooklyn Deploying Complex Applica1ons on Docker using Apache Brooklyn Andrew Kennedy @grkvlt ApacheCon, November 2014 Budapest, Hungary Introduc1on

More information

Enterprise Architecture CS 4720 Web & Mobile Systems

Enterprise Architecture CS 4720 Web & Mobile Systems Enterprise Architecture Web & Mobile Systems The Concept of a Web Service Each service is built around a func=on/feature That func=on is surrounded by a specified set of protocols (SOAP, POX, WSDL, WSD,

More information

Developing an IDE4L Grid

Developing an IDE4L Grid Developing an IDE4L Grid Presenter: Antonino Riccobono, Ph.D. RWTH Aachen University Project Coordinator: Prof. Sami Repo Tampere University of Technology 5 th November 2014 SLIDE 2 Contents Overview of

More information

Architecture of So-ware Systems Distributed Components, CORBA. Mar>n Rehák

Architecture of So-ware Systems Distributed Components, CORBA. Mar>n Rehák Architecture of So-ware Systems Distributed Components, CORBA Mar>n Rehák CORBA is OMG's open, vendor- independent specifica9on for an architecture and infrastructure that computer applica9ons use to work

More information

Sequen&al Consistency and Linearizability

Sequen&al Consistency and Linearizability Sequen&al Consistency and Linearizability (Or, Reasoning About Concurrent Objects) Acknowledgement: Slides par&ally adopted from the companion slides for the book "The Art of Mul&processor Programming"

More information

ECE 1749H: Interconnec1on Networks for Parallel Computer Architectures: Interface with System Architecture. Prof. Natalie Enright Jerger

ECE 1749H: Interconnec1on Networks for Parallel Computer Architectures: Interface with System Architecture. Prof. Natalie Enright Jerger ECE 1749H: Interconnec1on Networks for Parallel Computer Architectures: Interface with System Architecture Prof. Natalie Enright Jerger Systems and Interfaces Look at how systems interact and interface

More information

HyTrust Heals Healthcare

HyTrust Heals Healthcare HyTrust Heals Healthcare Challenges and Solu

More information

TerraSwarm. A Machine Learning and Op0miza0on Toolkit for the Swarm. Ilge Akkaya, Shuhei Emoto, Edward A. Lee. University of California, Berkeley

TerraSwarm. A Machine Learning and Op0miza0on Toolkit for the Swarm. Ilge Akkaya, Shuhei Emoto, Edward A. Lee. University of California, Berkeley TerraSwarm A Machine Learning and Op0miza0on Toolkit for the Swarm Ilge Akkaya, Shuhei Emoto, Edward A. Lee University of California, Berkeley TerraSwarm Tools Telecon 17 November 2014 Sponsored by the

More information

Data Model Considerations for Radar Systems

Data Model Considerations for Radar Systems WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,

More information

A Demand Side Management Framework Driven by Ambient Services and Consumer Profiling

A Demand Side Management Framework Driven by Ambient Services and Consumer Profiling A Demand Side Management Framework Driven by Ambient Services and Consumer Profiling Konstan>nos Tsatsakis k.tsatsakis@hypertech.gr Anastasios Tsitsanis HYPERTECH S.A. Mission & Objec>ves Explore alterna1ve

More information

Decentralized K-Means Clustering with Emergent Computing

Decentralized K-Means Clustering with Emergent Computing Decentralized K-Means Clustering with Emergent Computing Ryan McCune & Greg Madey University of Notre Dame, Computer Science & Engineering Spring Simula?on Mul?- Conference 2014, Tampa, FL Student Colloquium

More information

Enterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018

Enterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018 Enterprise Risk Management (ERM) and Cybersecurity Na9onal Science Founda9on March 14, 2018 Agenda Guiding Principles for Implementing ERM at NSF (Based on COSO) NSF s ERM Framework ERM Cybersecurity Risk

More information

Data-Driven Network Opera1ons. France-IX 2016 Avi Freedman

Data-Driven Network Opera1ons. France-IX 2016 Avi Freedman Data-Driven Network Opera1ons France-IX 2016 Avi Freedman Summary Why Data-Driven Network Opera1ons? The food: data types and sources Requirements and tool types Data Fusion Business-driven use cases:

More information

Stream and Complex Event Processing Discovering Exis7ng Systems: esper

Stream and Complex Event Processing Discovering Exis7ng Systems: esper Stream and Complex Event Processing Discovering Exis7ng Systems: esper G. Cugola E. Della Valle A. Margara Politecnico di Milano gianpaolo.cugola@polimi.it emanuele.dellavalle@polimi.it Univ. della Svizzera

More information

Outline Multi-agent Platforms. Existing problems. Existing problems (2)

Outline Multi-agent Platforms. Existing problems. Existing problems (2) Multi-agent Platforms Cosmin Carabelea Why multi-agent platforms? Examples of multi-agent platforms Cosmin.Carabelea@emse.fr SMA/SIMMO ENS Mines Saint-Etienne September 30 th, 2003 1 2 Existing problems

More information

A Compiler and Run- 1me System for Network Programming Languages

A Compiler and Run- 1me System for Network Programming Languages A Compiler and Run- 1me System for Network Programming Languages Christopher Monsanto, Princeton Nate Foster, Cornell Rob Harrison, West Point David Walker, Princeton 1 SoFware- Defined Networks Controller

More information

Agent Architectures & Languages. Heikki Helin

Agent Architectures & Languages. Heikki Helin Agent Architectures & Languages Heikki Helin Agent Architectures Introduction Different architectures Deliberative approach Reactive approach Hybrid approach Agent Architectures Definition Maes: An architecture

More information

1/12/11. ECE 1749H: Interconnec3on Networks for Parallel Computer Architectures. Introduc3on. Interconnec3on Networks Introduc3on

1/12/11. ECE 1749H: Interconnec3on Networks for Parallel Computer Architectures. Introduc3on. Interconnec3on Networks Introduc3on ECE 1749H: Interconnec3on Networks for Parallel Computer Architectures Introduc3on Prof. Natalie Enright Jerger Winter 2011 ECE 1749H: Interconnec3on Networks (Enright Jerger) 1 Interconnec3on Networks

More information

CSC 5991 Cyber Security Prac1ce

CSC 5991 Cyber Security Prac1ce CSC 5991 Cyber Security Prac1ce Fengwei Zhang Wayne State University CSC 5991 Cyber Security Prac1ce 1 Who Am I? Fengwei Zhang Assistant Professor of Computer Science Office: Maccabees Building, Room 14109.3

More information

Process dependability. Barbara Pernici Politecnico di Milano

Process dependability. Barbara Pernici Politecnico di Milano 1 Process dependability Barbara Pernici Politecnico di Milano Process dependability Design of Coopera6ve IS STAKEHOLDERS FAILURES Adap6ve systems Process dependability BPM SERVICE COMPOSITION Diagnosis

More information

IP CREW. Cogni,ve Radio Experimenta,on World

IP CREW. Cogni,ve Radio Experimenta,on World IP CREW Cogni,ve Radio Experimenta,on World 1st open call - informa,on session Ingrid Moerman Brussels, September 14, 2011 The research leading to these results has received funding from the European Union's

More information

Stream and Complex Event Processing Discovering Exis7ng Systems:c- sparql

Stream and Complex Event Processing Discovering Exis7ng Systems:c- sparql Stream and Complex Event Processing Discovering Exis7ng Systems:c- sparql G. Cugola E. Della Valle A. Margara Politecnico di Milano cugola@elet.polimi.it dellavalle@elet.polimi.it Vrije Universiteit Amsterdam

More information

Storage Workload Isolation via Tier Warming: How Models Can Help

Storage Workload Isolation via Tier Warming: How Models Can Help Storage Workload Isolation via Tier Warming: How Models Can Help By Ji Xue, Feng Yan, Alma Riska, and Evgenia Smirni Presented By Christian Contreras Proposed solution Storage workload prediction model

More information

Main Points. Address Transla+on Concept. Flexible Address Transla+on. Efficient Address Transla+on

Main Points. Address Transla+on Concept. Flexible Address Transla+on. Efficient Address Transla+on Address Transla+on Main Points Address Transla+on Concept How do we convert a virtual address to a physical address? Flexible Address Transla+on Segmenta+on Paging Mul+level transla+on Efficient Address

More information

Urb- IoT Developing a RESTful Communica>on Protocol and an Energy Op>miza>on Algorithm for a Connected Sustainable Home

Urb- IoT Developing a RESTful Communica>on Protocol and an Energy Op>miza>on Algorithm for a Connected Sustainable Home Urb- IoT 2014 Developing a RESTful Communica>on Protocol and an Energy Op>miza>on Algorithm for a Connected Sustainable Home So$rios D. Kotsopoulos, Federico Casalegno, Wesley Graybill, Adrià Recasens

More information

Today s Objec2ves. Kerberos. Kerberos Peer To Peer Overlay Networks Final Projects

Today s Objec2ves. Kerberos. Kerberos Peer To Peer Overlay Networks Final Projects Today s Objec2ves Kerberos Peer To Peer Overlay Networks Final Projects Nov 27, 2017 Sprenkle - CSCI325 1 Kerberos Trusted third party, runs by default on port 88 Security objects: Ø Ticket: token, verifying

More information

DISTRIBUTED DATABASES

DISTRIBUTED DATABASES DISTRIBUTED DATABASES INTRODUCTION: Database technology has taken us from a paradigm of data processing in which each application defined and maintained its own data, i.e. one in which data is defined

More information

ECE 1749H: Interconnec1on Networks for Parallel Computer Architectures. Introduc1on. Prof. Natalie Enright Jerger

ECE 1749H: Interconnec1on Networks for Parallel Computer Architectures. Introduc1on. Prof. Natalie Enright Jerger ECE 1749H: Interconnec1on Networks for Parallel Computer Architectures Introduc1on Prof. Natalie Enright Jerger Winter 2011 ECE 1749H: Interconnec1on Networks (Enright Jerger) 1 Interconnec1on Networks

More information

From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on

From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on Distributed Embedded Systems University of Paderborn From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on Falko Dressler dressler@ccs-labs.org Science Brunch, Zurich From Connected

More information

Applications of Secure Coding in Distributed Storage and Wireless Networking

Applications of Secure Coding in Distributed Storage and Wireless Networking Applications of Secure Coding in Distributed Storage and Wireless Networking Reza Curtmola New Jersey Institute of Technology Parts of this presentation are based on joint work with Bo Chen, Randal Burns,

More information

Stay Informed During and AEer OpenWorld

Stay Informed During and AEer OpenWorld Stay Informed During and AEer OpenWorld TwiIer: @OracleBigData, @OracleExadata, @Infrastructure Follow #CloudReady LinkedIn: Oracle IT Infrastructure Oracle Showcase Page Oracle Big Data Oracle Showcase

More information

Survey of MAS Methods and Platforms focusing on organizational concepts

Survey of MAS Methods and Platforms focusing on organizational concepts Survey of MAS Methods and Platforms focusing on organizational concepts Estefanía Argente Adriana Giret Soledad Valero Vicente Julián Vicente Botti Departamento de Sistemas Informáticos y Computación,

More information

Kaseya Advanced Workshop DAY TWO

Kaseya Advanced Workshop DAY TWO Kaseya Advanced Workshop DAY TWO Developed by Kaseya University Powered by IT Scholars 1 Kaseya Version 6.2 Last updated on June 25, 2012 Day One Roadmap! Advanced Agent Procedures Day Two Advanced Monitoring

More information

A self Adaptive Security Framework for Networked Control Systems Term Paper Presentation CS 788 Fall 2015 Instructor: Professor Daniel A.

A self Adaptive Security Framework for Networked Control Systems Term Paper Presentation CS 788 Fall 2015 Instructor: Professor Daniel A. A self Adaptive Security Framework for Networked Control Systems Term Paper Presentation CS 788 Fall 2015 Instructor: Professor Daniel A. Menasce By Eniye Tebekaemi November 30, 2015 OUTLINE Introduction

More information

Networking: Hardware, Rou?ng and new Challenges

Networking: Hardware, Rou?ng and new Challenges Mestrado em Engenharia Informá?ca e de Computadores Master Degree (MSc) in Informa?on Systems and Computer Engineering Administração e Gestão de Infra-estruturas de IT IT Infrastructure Management and

More information